Patents Examined by Stephen Sanders
  • Patent number: 9774627
    Abstract: Honey tokens are generated by one or more applications in memory of a device. The honey tokens resemble data that may be of interest to memory-scraping malware. The honey tokens are monitored in memory and when access is detected an alert is raised that there is a potential of having memory-scraping malware, which is operational within memory of the device.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: September 26, 2017
    Assignee: NCR Corporation
    Inventor: Leonid Zeltser
  • Patent number: 9760725
    Abstract: Some embodiments provide one or more of systems, methods, software, and data structures to control locations where files may be stored. Some such embodiments include receiving a request to perform a file management function affecting a location where a first file is stored and querying a repository of file management rules as a function of at least one of a file type of the first file, a location where the first file is stored, a destination of where the first file is to be stored, and an identity of a user to retrieve a first set of file management rules. These embodiments further include determining if the destination is an authorized location where the first file may be stored as a function of the first set of retrieved file management rules and preventing the file management function when the determining identifies that the destination is not an authorized location.
    Type: Grant
    Filed: June 11, 2008
    Date of Patent: September 12, 2017
    Assignee: CA, Inc.
    Inventor: Srikanth Mandava
  • Patent number: 9762771
    Abstract: The storage section of the multifunction peripheral stores location information containing a storage location of software which transmits a control command whose execution is permissible. The execution permission judging section of the multifunction peripheral includes (I) a storage location detecting section which detects a storage location of software which has participated in a transmission of a received control command and (II) a command permitting/prohibiting section which (i) prohibits execution of the received control command when a storage location indicated by the location information is not detected by the storage location detecting section but (ii) permits execution of the received control command when the storage location is detected by the storage location detecting section.
    Type: Grant
    Filed: September 18, 2015
    Date of Patent: September 12, 2017
    Assignee: SHARP KABUSHIKI KAISHA
    Inventor: Akihiro Okamura
  • Patent number: 9749137
    Abstract: Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device.
    Type: Grant
    Filed: January 27, 2016
    Date of Patent: August 29, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ashish Kundu, Amit A. Nanavati, Danny Soroker
  • Patent number: 9740567
    Abstract: A system and method of selectively providing encrypted data is provided. Embodiments of the invention may store data in encrypted form on a storage device. Embodiments of the invention may selectively provide encrypted or decrypted data to a requestor of data based on configuration or other parameters. A filter driver or other module or unit may examine a request for, or communication of data from the storage device and may determine if data is to be provided in encrypted or decrypted form. Decrypted data may be provided to a caching system. A filter driver or other module or unit may examine a request for, or communication of data from the caching system. Data provided from the caching system may be selectively encrypted based on configuration or other parameters.
    Type: Grant
    Filed: December 7, 2010
    Date of Patent: August 22, 2017
    Assignee: Safend Ltd.
    Inventors: Pavel Berengoltz, Leonid Dorrendorf, Edward Almer
  • Patent number: 9736185
    Abstract: Techniques for configuring a network based on a Domain Name System (DNS) or network metadata policy for network control are disclosed. In some embodiments, a system, process, and/or computer program product for a DNS or network metadata policy for network control includes receiving a DNS or network metadata update at a DNS server (e.g., an authoritative or recursive DNS server) or an IP Address Management (IPAM) server, in which the DNS or network metadata update is determined to be relevant to the DNS or network metadata policy for network control; and sending the DNS or network metadata update to a network controller for a network, in which the network controller configures a plurality of network devices on the network based on the DNS or network metadata policy for network control.
    Type: Grant
    Filed: July 22, 2015
    Date of Patent: August 15, 2017
    Assignee: Infoblox Inc.
    Inventors: John Dominic Belamaric, Soheil Eizadi, John Charles Voss
  • Patent number: 9710616
    Abstract: Presented is a system and methods for receiving metadata, a decryption module and encrypted content from a cable headend, decrypting the encrypted content with the decryption module and presenting the decrypted content to a user. The client device can receive, load and execute any decryption module compatible with the system framework allowing flexibility in the choice or changing of client device manufacturer and/or Digital Rights Management system vendor.
    Type: Grant
    Filed: December 15, 2010
    Date of Patent: July 18, 2017
    Assignee: ERICSSON AB
    Inventor: Alan Rouse
  • Patent number: 9712545
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to determine when a peripheral is connected to the electronic device, determine a peripheral identification for the peripheral, and monitor the data going to and from the peripheral. Based on the monitored data, a type for the peripheral can be determine. The peripheral identification can be compared with the determined type for the peripheral and if they do not match, then communication to and from the peripheral can be blocked.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: July 18, 2017
    Assignee: McAfee, Inc.
    Inventors: Jonathan L. Edwards, Cedric Cochin, Aditya Kapoor
  • Patent number: 9704817
    Abstract: An apparatus, method and system for securing proprietary semiconductor IC components including a target semiconductor IC; at least one laser diode array disposed adjacent to the target semiconductor IC and coupled thereto; a power supply coupled to the at least one laser diode array; a sensor for sensing a predetermined parameter operatively coupled to the laser diode array through the power supply; wherein the sensor detects the existence of a predetermined event and as a result of the detection of the predetermined event activates the power supply and energizes the laser diode array, causing the laser diode array to project focused laser energy into the target semiconductor IC, damaging the target semiconductor IC.
    Type: Grant
    Filed: September 5, 2008
    Date of Patent: July 11, 2017
    Assignee: QorTek, Inc.
    Inventors: Gareth J. Knowles, Lindsay Quarrie
  • Patent number: 9697355
    Abstract: A cyber security system and method that includes one or more devices configured to determine a cyber security threat or breach event based on analysis of operational information of a protected system.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: July 4, 2017
    Assignee: MISSION SECURE, INC.
    Inventors: Daniel D. Park, Frantisek Brabec, Rick A. Jones, Edward C. Suhler, David R. M. Drescher, Edward P. Pernotto
  • Patent number: 9699161
    Abstract: A system and method including: receiving, from a client device, an authorization request originating from an authorization module of an application executing on the client device, where the authorization request includes an identifier identifying the client device; causing transmission, based on the identifier, of a verification message to the client device, where the verification message includes a verification code; receiving a confirmation of the verification code from the authorization module of the application executing on the client device; authenticating the application based on the receiving the confirmation of the verification code; determining that the client device identified by the identifier corresponds to a user account including secure user data associated with a user; and transmitting a unique token verifying that the application is authorized to sign into the user account, where: the unique token uniquely identifies the user account to the application, and the secure user data is not shared w
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: July 4, 2017
    Assignee: Twitter, Inc.
    Inventors: Michael Ducker, Sean Cook, Jeffrey Seibert, Jr., Alex Roetter, Kevin Weil, Akash Garg, Jeremy Gordon
  • Patent number: 9692776
    Abstract: The disclosed computer-implemented method for evaluating content provided to users via user interfaces may include (1) monitoring, as part of a security application via an accessibility application program interface provided by an operating system of a computing device, accessibility events that indicate state transitions in user interfaces of applications running on the computing device, (2) receiving, at the security application, an accessibility event that indicates that a user of the computing device is viewing a user interface of an application running on the computing device, (3) identifying, as part of the security application via the accessibility application program interface, content that the user is attempting to access via the application, (4) determining, as part of the security application, that the content is harmful, and (5) performing, as part of the security application, at least one security action in response to determining that the content is harmful.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: June 27, 2017
    Assignee: Symantec Corporation
    Inventor: Anubhav Savant
  • Patent number: 9679125
    Abstract: Methods, devices, and systems are provided to rapidly detect and prevent cyber-attacks that are enabled by either misuse of identity credentials or weaknesses within the identity credential lifecycle. An Identity Analytics and Intelligence Engine provides an automated process for the collection, exchange, analysis, correlation, and reporting of identity credential lifecycle data. The Identity Analytics and Intelligence Engine may be implemented as a Software as a Service (SaaS) capability. The Identity Analytics and Intelligence Engine applies Semantic Web concepts/technologies and graph databases to automatically capture the identity credential lifecycle data along with the associated data exchanges within one or more Trust Frameworks.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: June 13, 2017
    Assignee: PEGRight, Inc.
    Inventors: Paul Dennis Bailor, Eric Louis Uythoven
  • Patent number: 9667411
    Abstract: Methods, systems, computer-readable media, and apparatuses for providing secure resources to a native operating system resource are described herein. Using one or more aspects described herein, a mobile device may determine that a native operating system service requests to access content located within a wrapped application. The mobile device may transmit, to the native operating system service, a server path to a loopback web server within the wrapped application to elicit a request from the native operating system service to the loopback web server for the content. In response to receiving a request comprising the server path to the loopback web server to retrieve the content from the loopback web server, the mobile device may instruct the loopback web server to transmit an unencrypted version of the content to the native operating system service.
    Type: Grant
    Filed: June 18, 2015
    Date of Patent: May 30, 2017
    Assignee: Citrix Systems, Inc.
    Inventor: Krishna Kumar
  • Patent number: 9667640
    Abstract: The disclosed embodiments relate to a system that generates an alert based on information extracted from search results generated by a query. During operation, the system executes the query to generate the search results. The system also obtains configuration information for the alert, wherein the configuration information identifies information associated with the search results, and also specifies a trigger condition for the alert. Next, when the trigger condition for the alert is met, the system uses the configuration information to generate a payload containing the identified information associated with the search results. The system then invokes alert-generating functionality and provides the payload as input to the alert-generating functionality. This enables the alert-generating functionality to use the information from the search results while performing one or more alert actions association with the alert.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: May 30, 2017
    Assignee: Splunk Inc.
    Inventors: Nicholas J. Filippi, Siegfried Puchbauer-Schnabel, Carl S. Yestrau, Vivian Shen, J. Mathew Elting
  • Patent number: 9652619
    Abstract: The invention relates to a method of inputting confidential data on a terminal including an input interface, at least one processor for running a trusted program and a display screen, the method including the following steps applied before the input: taking exclusive control of the input interface by the trusted program; displaying on the screen a trusted image known to the user of the terminal to indicate that exclusive control of the input interface has been taken by the trusted program; after control has been taken and before displaying the trusted image, selecting the trusted image as part of a reference image predetermined by the user, wherein the selected trusted image varies from one input to another. The invention also relates to a terminal for use of said method.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: May 16, 2017
    Assignee: MORPHO
    Inventor: Romain Picon
  • Patent number: 9654475
    Abstract: A computer-implemented method for controlling adaptive streaming media access includes requesting a first portion of media content from a content server and requesting authorization corresponding to a second portion of media content from an authorization server. The method further includes submitting evidence to the authorization server that the first portion of media content has been received by a client device and receiving a representation of authorization to access the second portion of media content in response to the evidence complying with a requirement. The method also includes requesting the second portion of media content from the content server, presenting the representation of authorization to the content server, and receiving the second portion of media content in response to the representation of authorization being accepted by the content server.
    Type: Grant
    Filed: January 12, 2015
    Date of Patent: May 16, 2017
    Assignee: Futurewei Technologies, Inc.
    Inventors: Shaobo Zhang, Xin Wang, Yongliang Liu
  • Patent number: 9654485
    Abstract: An analytics-based security monitoring system includes instructions that may be executed by a computing system to receive data in the form of event logs from one or more network devices transferred through a computing environment, detect a plurality of behavioral characteristics from the received event logs, identify behavioral fragments composed of related behavioral characteristics, and identify an attack by correlating the behavioral fragments against patterns of known malicious attacks. The analytics-based security monitoring system may then perform a learning process to enhance further detection of attacks and perform one or more remedial actions when an attack is identified.
    Type: Grant
    Filed: April 13, 2015
    Date of Patent: May 16, 2017
    Assignee: FireEye, Inc.
    Inventor: Justin Neumann
  • Patent number: 9619661
    Abstract: A method and system for managing personal data is provided as a means to increase the efficiency and effectiveness of personal data access, approval and curation across multiple content sources. The method and system accomplishes this by discovering, identifying, collecting normalizing personal information from content sources then alerting the user to any identifiable use of their personal information and allowing the user to directly dictate personal information use policies and manually control individual personal data attributes on multiple content platforms.
    Type: Grant
    Filed: June 17, 2015
    Date of Patent: April 11, 2017
    Inventor: Charles Finkelstein
  • Patent number: 9621631
    Abstract: In various example embodiments, a system and method for transferring the state of a first device to a second device are disclosed. An instruction to transfer a state of a first device to a second device is received. In response, information related to the state of the first device is packaged into a file. A type of connection to be used to transfer the state of the device is determined based on the connections available to the first device and the second device. The file containing the information of the state of the first device is transferred to the second device using the connection type. The file, when processed by the second device, causes the second device to reproduce the state of the first device.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: April 11, 2017
    Assignee: eBay Inc.
    Inventor: Matthew Scott Zises